Question 1
In which layer of network architecture, the secured socket layer (SSL) is used?
physical layer
session layer
application layer
presentation layer
       Computer-Networks       OSI-TCP-layers       ISRO CS 2011
Question 1 Explanation: 
Secure Socket Layer is networking protocol used at transport layer to provide secure connection between client and server over internet. It places itself as and application layer protocol in the TCP/IP reference model and as presentation layer protocol in the OSI model.
Question 2
The protocol data unit for the transport layer in the internet stack is
       Computer-Networks       OSI-TCP-layers       ISRO CS 2013
Question 2 Explanation: 
A protocol data unit (PDU) is a single unit of information transmitted among peer entities of a computer network.
A PDU is composed of protocol specific control information and user data
Protocol data units for the Internet protocol suite are:
The transport layer PDU is the TCP segment for
→TCP, and the datagram for UDP.
→The Internet layer PDU is the packet.
→The link layer PDU is the frame.
Question 3

Which of the following statements are true ?

    (a) Advanced Mobile Phone System (AMPS) is a second generation cellular phone system.
    (b) IS - 95 is a second generation cellular phone system based on CDMA and DSSS.
    (c) The Third generation cellular phone system will provide universal personnel communication.
(a) and (b) only
(b) and (c) only
(a), (b) and (c)
(a) and (c) only
       Computer-Networks       OSI-TCP-layers       UGC-NET CS 2018 JUNE Paper-2
Question 3 Explanation: 
(a) FALSE:
AMPS is a first-generation cellular technology that uses separate frequencies, or "channels", for each conversation (see frequency-division multiple access (FDMA)). It therefore required considerable bandwidth for a large number of users. In general terms, AMPS was very similar to the older "0G" Improved Mobile Telephone Service, but used considerably more computing power in order to select frequencies, hand off conversations to PSTN lines, and handle billing and call setup.
(b) TRUE:
IS - 95 is a second generation cellular phone system based on CDMA and DSSS.
(c) TRUE:
The Third generation cellular phone system will provide universal personnel communication.
Question 4

Consider ISO-OSI network architecture reference model. Session layer of this model offer Dialog control, token management and ____________ as services.

Flow control
       Computer-Networks       OSI-TCP-layers       UGC-NET CS 2018 DEC Paper-2
Question 4 Explanation: 
→ The session layer is the network dialog controller. It establishes, maintains, and synchronizes the interaction among communicating systems.
Dialog control: The session layer allows two systems to enter into a dialog. It allows the communication between two processes to take place in either half-duplex (one way at a time) or full-duplex (two ways at a time) mode.
Synchronization: The session layer allows a process to add checkpoints, or synchronization points, to a stream of data. For example, if a system is sending a file of 2000 pages, it is advisable to insert checkpoints after every 100 pages to ensure that each 100-page unit is received and acknowledged independently. In this case, if a crash happens during the transmission of page 523, the only pages that need to be reset after system recovery are pages 501 to 523. Pages previous to 501 need not be resent.
Question 5
Repeaters function in
Physical layer
Data link layer
Network layer
Both (A) and (B)
       Computer-Networks       OSI-TCP-layers       Nielit Scientist-C 2016 march
Question 5 Explanation: 
● A repeater is an electronic device that receives a ​ signal​ and retransmits it.
● Repeaters are used to extend transmissions so that the signal can cover longer distances or be received on the other side of an obstruction.
● Physical layer in the OSI model plays the role of interacting with actual hardware and signaling mechanism
Question 6
Which layers of the OSI reference model are host-to-host layers?
Transport, session, presentation, application
Session, presentation, application
Datalink, transport, presentation, application
Physical, datalink, network, transport
       Computer-Networks       OSI-TCP-layers       ISRO CS 2015       Video-Explanation
Question 6 Explanation: 

Question 7

Chose the option which matches each element of LIST-1 with exactly one element of LIST-2:

(i)-(d), (ii)-(c), (iii)-(b), (iv)-(a)
(i)-(b), (ii)-(a), (iii)-(d), (iv)-(c)
(i)-(a), (ii)-(d), (iii)-(c), (iv)-(b)
(i)-(d), (ii)-(b), (iii)-(c), (iv)-(a)
       Computer-Networks       OSI-TCP-layers       JT(IT) 2018 PART-B Computer Science
Question 7 Explanation: 
1. Repeater→ Physical layer: Its job is to regenerate the signal over the same network before the signal becomes too weak or corrupted so as to extend the length to which the signal can be transmitted over the same network.
2. Gateway→ All seven layers: A gateway, as the name suggests, is a passage to connect two networks together that may work upon different networking models. They basically works as the messenger agents that take data from one system, interpret it, and transfer it to another system. Gateways are also called protocol converters and can operate at any network layer. Gateways are generally more complex than switch or router.
3. Router→ Network layer: A router is a device like a switch that routes data packets based on their IP addresses. Router is mainly a Network Layer device. Routers normally connect LANs and WANs together and have a dynamically updating routing table based on which they make decisions on routing the data packets. Router divide broadcast domains of hosts connected through it.
Bridge→ Data link layer: A bridge is a repeater, with add on functionality of filtering content by reading the MAC addresses of source and destination. It is also used for interconnecting two LANs working on the same protocol. It has a single input and single output port, thus making it a 2 port device.
Question 8
Bit stuffing refers to
Inserting a '0' in user data stream to differentiate it with a flag
Inserting a '0' in flag stream to avoid ambiguity
Appending a nibble to the flag sequence
Appending a nibble to the user data stream
       Computer-Networks       OSI-TCP-layers       Nielit Scientific Assistance IT 15-10-2017
Question 8 Explanation: 
●The term "bit stuffing" broadly refers to a technique whereby extra bits are added to a data stream, which do not themselves carry any information, but either assist in management of the communications or deal with other issues.
●The receiver knows how to detect and remove or disregard the stuffed bits.
There are 8 questions to complete.

Access quiz wise question and answers by becoming as a solutions adda PRO SUBSCRIBER with Ad-Free content

Register Now

If you have registered and made your payment please contact solutionsadda.in@gmail.com to get access